Abends2 / RedShift.190__WriteUpsLinks
Репозиторий, содержащий решения тасков и описание инцидента - RedShift190
☆10Updated 2 years ago
Alternatives and similar repositories for RedShift.190__WriteUps
Users that are interested in RedShift.190__WriteUps are comparing it to the libraries listed below
Sorting:
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆20Updated last year
- Kaspersky Security Center: custom decoders and rules for Wazuh SIEM☆18Updated last year
- ☆137Updated 4 years ago
- Setezor is a network traffic analyzer with the ability to automatically build network topology☆180Updated last week
- ExeRay AI detects malicious Windows executables using ML. Analyzes entropy, imports, and metadata for rapid classification, aiding incide…☆58Updated 6 months ago
- RAG/LLM Security Scanner identifies critical vulnerabilities in AI-powered applications, including chatbots, virtual assistants, and know…☆61Updated 4 months ago
- Friendly graphical output of the nmap tool that allows filtering by open ports☆185Updated 3 years ago
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆186Updated last year
- Hackings style defence tricks☆58Updated last month
- Ресурсы, связанные с безопасностью приложений, исследователями и разработчиками в области безопасности.☆50Updated 3 years ago
- Репозиторий содержит список вопросов по наступальной безопасности.☆358Updated 3 months ago
- ☆17Updated last year
- A FREE comprehensive online Go hacking tutorial utilizing the x64, ARM64 and ARM32 architectures going step-by-step into the world of rev…☆237Updated 2 months ago
- ☆11Updated 3 years ago
- sorted russian names/surnames wordlists☆76Updated last year
- Сборная солянка по разным направлениям в ИБ!☆62Updated 3 weeks ago
- https://t.me/+V6d8SvKVFXo2MjIy☆41Updated 3 years ago
- Convert any binary data to a PNG image file and vice versa.☆135Updated 2 years ago
- Free educational courses in reverse engineering, malware analysis, and programming☆475Updated 5 months ago
- Finding secrets in various (non-text) popular files.☆51Updated 3 months ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆106Updated 3 months ago
- Мой читшит. Можно использовать, но рекомендую сделать свой.☆17Updated last year
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆41Updated last year
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆92Updated last year
- All in 1 phishing framework☆37Updated 3 years ago
- Modern web-based distributed hashcracking solution, built on hashcat☆191Updated this week
- vusialization of geo points from photos from vk profile☆47Updated 3 years ago
- Local encrypt and decrypt telegram messages using secret keys.☆39Updated last year
- A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.☆278Updated 4 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆142Updated last year